Sandworm
Russian military-intelligence (GRU Unit 74455) intrusion set responsible for some of the most destructive cyberattacks publicly attributed to a nation-state: the 2015 and 2016 Ukrainian power-grid outages, the 2017 NotPetya wiper outbreak (the costliest cyberattack in history), and the 2018 Olympic Destroyer attack against the Winter Olympics. Operations continue against Ukrainian critical infrastructure, including the 2022 Industroyer2 attempt.
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
- Sandworm
- Russia
- destruction
- disruption
- espionage
- energy
- government
- transportation
- UA
- GE
- +1 more
MITRE ATT&CK techniques
Tools & malware
4 entriesTimeline
4 events- ReportHigh2025-02-12·Microsoft Threat Intelligence
Microsoft details Seashell Blizzard 'BadPilot' subgroup multi-year access ops
Microsoft Threat Intelligence published research on a Sandworm (Seashell Blizzard) subgroup it tracks as BadPilot, active since at least 2021, that opportunistically exploits internet-facing appliances (notably ConnectWise ScreenConnect and Fortinet FortiClient EMS since early 2024) to establish persistent access for follow-on Sandworm operations. Targets since 2024 expanded to U.S. and U.K. organizations across energy, oil and gas, telecommunications, shipping, arms manufacturing, and government.
initial-accessedge-devicesgruusuk - IndictmentHigh2020-10-19·U.S. Department of Justice
DOJ indicts six GRU Unit 74455 officers
The U.S. Department of Justice unsealed an indictment charging six officers of the Russian GRU's Unit 74455 (Sandworm) in connection with a years-long campaign that included the 2015 and 2016 Ukraine power-grid attacks, the 2017 NotPetya outbreak, the 2018 Olympic Destroyer attack against the PyeongChang Winter Olympics, and operations against the 2017 French elections.
dojindictmentgru - CompromiseCritical2017-06-27·UK National Cyber Security Centre
NotPetya wiper outbreak via M.E.Doc supply chain
A destructive wiper masquerading as ransomware spread globally via a trojanized update to M.E.Doc, a Ukrainian accounting software package. Damages were later estimated at over USD 10 billion, making NotPetya the costliest cyberattack on record. The U.S., U.K., and other governments publicly attributed the operation to the Russian GRU.
wipersupply-chainukrainedestruction - CompromiseCritical2015-12-23·CISA (ICS-CERT)
Coordinated attack on Ukrainian electricity distribution
Three Ukrainian regional electricity distribution companies (oblenergos) were simultaneously attacked, cutting power to approximately 225,000 customers for several hours. ICS-CERT and later attribution work tied the operation to Sandworm; this is widely regarded as the first publicly confirmed cyberattack to cause a power outage.
icsukrainedestructionenergy
Indicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-1 | family · Industroyer2 Industroyer2 sample (108_100.exe), an IEC-104 ICS-disruption tool that Sandworm deployed against a Ukrainian energy provider on 8 April 2022. Discovery and IOC publication by ESET working with CERT-UA; ESET assesses Sandworm responsibility with high confidence. | Apr 7, 2022 | ESET |
| SHA-256 | family · AcidRain AcidRain - MIPS ELF wiper (filename 'ukrop') that bricked modems on Viasat's KA-SAT network on 24 February 2022, disrupting service across Ukraine and downstream wind-turbine telemetry in Germany. SentinelLabs published the hash and noted code overlap with VPNFilter (attributed to Sandworm). | Feb 23, 2022 | SentinelLabs |
| SHA-256 | family · HermeticWiper HermeticWiper / Trojan.Killdisk sample (Symantec Threat Hunter Team), deployed against Ukrainian organisations from 23 February 2022. Listed in CISA / FBI joint advisory AA22-057A appendix Table 2. The campaign is widely attributed to GRU Unit 74455 (Sandworm). | Feb 22, 2022 | CISA |
Related actors
shared ATT&CK techniques- IR · IranHandala2 shared techniques
- IL · IsraelPredatory Sparrow2 shared techniques
- RU · Russia8Base1 shared technique
- ?? · UnknownAkira1 shared technique
- ?? · UnknownALPHV/BlackCat1 shared technique
- KP · DPRKAndariel1 shared technique
References
cite this page
Threat Intel Tracker. (2026-05-19). Sandworm — actor profile. Retrieved from https://threatintel.local/actors/sandworm